Chapter 5 security Plus
Across
- 6. A request that has been fabricated
- 7. takes advantage of a vulnerability to move to restricted directories
- 8. store data in RAM beyond the boundaries
- 9. An attack in which a website accepts user input without validating it
- 10. hides its presence on the device
- 12. A sign an attack is currently underway
- 13. A malicious program that uses a computer network to replicate
- 14. move from the root directory to other restricted directories
- 16. An attack that copies data and then uses it
- 18. account that is inaccessible through a normal login attempt
- 20. Malware that replicates by infecting other files or programs
- 22. An indicator of attack in which data is no longer accessible
- 23. An attack in which threat actors introduce something into RAM
- 24. Closing unused ports and disabling unnecessary protocols
- 25. inserts statements to manipulate a database server
Down
- 1. depletion of memory or processing capabilities
- 2. resource that is not possible due to geography
- 3. It only goes off after certain conditions are met
- 4. threat actor gains illicit access of elevated rights or privileges
- 5. Software installed on a device without the user requesting it
- 11. Malware disguised as something useful or legitimate
- 15. A cookie that is only sent to the server with an encrypted request
- 17. Installing software security updates
- 19. captures and stores each keystroke that a user types on the computer’s keyboard
- 21. Secure space for running untrusted software
- 24. monitors endpoints and immediately blocks a malicious attack